CompTIA Network+ (N10-007)
CompTIA Network+ (N10-007)
CompTIA Network+ (N10-007)
Content Outline
CompTIA Network+ N10-007 has been updated and reorga-
nized to address the current networking technologies with ex-
panded coverage of several domains by adding:
1. Critical security concepts to helping networking profession-
als work with security practitioners
2. Key cloud computing best practices and typical service
models
3. Coverage of newer hardware and virtualization techniques
4. Concepts to give individuals the combination of skills to
keep the network resilient
The following topics are general guidelines for the content likely
to be included on the exam. However, other related topics may
also appear on any specific delivery of the exam. To better re-
flect the contents of the exam and for clarity purposes, the
guidelines below may change at any time without notice.
9
CHAPTER 1
NETWORKING CONCEPTS
Questions 1-38
10
(B) 11111111.11111111.11000000.00000000
(C) 11111111.11111111.11111000.00000000
(D) 11111111.11111111.10000000.00000000
13
Question 13. Given the following DNS Records, which one is
used to point a domain or subdomain to another hostname?
(A) CNAME
(B) AAAA
(C) NS
(D) A
15
Question 20. Which of the following functions is the function
of ARP?
(A) Resolves hostnames to IP addresses
(B) Resolves IP addresses to MAC addresses
(C) Resolves MAC addresses to IP addresses
(D) Resolves IP addresses to hostnames
Question 36. The routing protocol that does not rely on peri-
odic advertisement of all the network prefixes in an au-
tonomous system is called _______________.
21
(A) RIP
(B) OSPF
(C) EIGRP
(D) BGP
22
Answers 1-38
23
Wireless Mesh Topology is incorrect because it isn’t a wired
network topology.
Explanation 2. 11111111.11111111.11000000.00000000 is
the correct answer.
There are only nine possible values in one octet of a subnet
mask as shown in the table below.
0 0 0
10000000 128 1
11000000 192 2
11100000 224 3
24
11110000 240 4
11111000 248 5
11111100 252 6
11111110 254 7
11111111 255 8
Explanation 3. 11111111.11111111.10000000.00000000 is
the correct answer.
There are only nine possible values in one octet of a subnet
mask as shown in the table below.
25
Binary Mask Decimal Number of
Octet Equivalent Binary 1s
0 0 0
10000000 128 1
11000000 192 2
11100000 224 3
11110000 240 4
11111000 248 5
11111100 252 6
11111110 254 7
11111111 255 8
0 0 0
10000000 128 1
11000000 192 2
11100000 224 3
11110000 240 4
11111000 248 5
11111100 252 6
11111110 254 7
11111111 255 8
30
Explanation 8. C, D and E are the correct answers.
Class A networks have the first octet in the range of 1–126, in-
clusive, and their network IDs have a 0 in the last three octets.
32
IEEE Standards Frequency/Medium Speed
802.11a 5 GHz Up to
54Mbps
802.11ac 5 GHz Up to
1.3Gbps
TCP is slower than UDP because it has a lot more to do. TCP
has to establish a connection, error-check, and guarantee that
files are received in the order they were sent.
1. VPN tunneling
2. Streaming videos
3. Online games
4. Live broadcasts
5. Domain Name System (DNS)
34
6. Voice over Internet Protocol (VoIP)
7. Trivial File Transfer Protocol (TFTP)
37
Explanation 14. Infrastructure wireless topology is the cor-
rect answer.
Infrastructure wireless topology is normally used to extend a
wired LAN to connect wireless-capable devices. A wireless
network infrastructure device called wireless Access Point
(AP) is used to extend wired LAN to wireless LAN.
40
Question 18. Which of the following protocols uses the port
53 for its service?
(A) DNS
(B) HTTP
(C) SSH
(D) SMTP
42
Reverse DNS is responsible for resolving IP addresses to host-
names.
False statements:
1. Bluetooth uses the 3.4 to 3.485 GHz band.
2. Near-field communication (NFC) is a long-range wireless
connectivity technology that lets NFC-enabled devices com-
municate with each other.
3. Z-Wave is a wired communication protocol.
Disadvantages:
1. Requires more cable than most of the other topologies.
2. The overall bandwidth and performance of the network are
also limited by the central node’s configurations and technical
specifications.
45
Question 23. You have been tasked to create a wired topology
so as each device have to be connected with the two devices
on either side of it. Which of the following topologies will you
implement?
(A) Bus topology
(B) Star topology
(C) Mesh topology
(D) Ring topology
46
Advantages:
1. Cable faults are easily located, making troubleshooting easi-
er.
2. Only one station on the network is permitted to send data at
a time, which greatly reduces the risk of packet collisions
Disadvantages:
1. All the devices on the network share bandwidth, so the addi-
tion of more devices can contribute to overall communication
delays.
2. A single break in the cable can disrupt the entire network.
IEEE 2.4
Standard GHz 5 GHz Max Data Rate
50
802.11ax Yes Yes 4x higher than
802.11ac
53
Explanation 30. QoS is the correct answer.
Quality of Service (QoS) in networking is the process of man-
aging network resources to reduce packet loss as well as lower
network jitter and latency. QoS technology can manage re-
sources by assigning the various types of network data differ-
ent priority levels.
There are four critical areas in which SDN technology can make
a difference for an organization.
Question 36. The routing protocol that does not rely on peri-
odic advertisement of all the network prefixes in an au-
tonomous system is called _______________.
(A) RIP
(B) OSPF
(C) EIGRP
(D) BGP
59
Explanation 36. EIGRP is the correct answer.
The routing protocol that does not rely on periodic advertise-
ment of all the network prefixes in an autonomous system is
called EIGRP. The protocol advertises incremental updates only
as topology changes occur within a network.
60
EIGRP is an enhanced distance vector protocol, relying on the
Diffused Update Algorithm (DUAL) to calculate the shortest
path to a destination within a network.
63
CHAPTER 2
INFRASTRUCTURE
Questions 39-65
(A) MTRJ
(B) SC
(C) LC
(D) ST
69
(A) MTRJ
(B) SC
(C) LC
(D) ST
(A) MTRJ
(B) SC
(C) LC
(D) ST
73
Answers 39-65
NAS Benefits:
1. Relatively inexpensive.
2. 24/7 and remote data availability.
3. Good expandability.
4. Redundant storage architecture.
5. Automatic backups to other devices and cloud.
6. Flexibility.
75
Question 40. Which of the following statements is true regard-
ing crossover cables.
(A) Wires 1 and 3 and wires 2 and 6 are crossed
(B) Wires 1 and 6 and wires 2 and 3 are crossed
(C) Wires 1 and 2 and wires 3 and 4 are crossed
(D) Wires 1 and 4 and wires 2 and 6 are crossed
79
A crossover cable is a type of twisted-pair copper wire cable for
LANs (local area network) in which the wires on the cable are
crossed over so that the receive signal pins on the RJ-45 con-
nector on one end are connected to the transmit signal pins on
the RJ-45 connector on the other end.
81
Explanation 46. destination IP is the correct answer.
When an IP packet is to be forwarded, a router uses its forward-
ing table to determine the next hop for the packet’s destination
based on the destination IP address.
82
Question 48. Which of the following advanced networking de-
vices manages wireless network access points that allow wire-
less devices to connect to the network?
(A) Proxy server
(B) Load balancer
(C) Wireless controller
(D) VPN concentrator
The request then comes back through that same proxy server
(there are exceptions to this rule), and then the proxy server
forwards the data received from the website to you.
86
Question 51. The forwarding technology that uses labels in-
stead of looking in a routing table to forward data is called
________________.
(A) PLSM
(B) MPLS
(C) SLPM
(D) LMSP
(A) MTRJ
(B) SC
(C) LC
(D) ST
90
(A) MTRJ
(B) SC
(C) LC
(D) ST
Catego Maximum
ry data rate Usual application
92
CAT 5 100 MHz 100 Mbps TPDDI
155 Mbps ATM
No longer supported; replaced
by 5E.
10/100BASE-T
4/16MBps Token Ring
Analog Voice
93
CAT 7 600 MHz Full-motion video
(ISO 1.2 GHz in Teleradiology
Class pairs with Government and
F) Siemon manufacturing environments
connector Fully Shielded (S/FTP) system
using non-RJ45 connectors
but backwards compatible with
hybrid cords.
Until February 2008, the only
standard (published in 2002)
to support 10GBASE-T for a
full 100m.
95
Explanation 58. FCoE is the correct answer.
Fiber Channel over Ethernet (FCoE) is a storage protocol that
ensures that Fiber Channel communications are transmitted di-
rectly over Ethernet. FCoE moves Fiber Channel traffic to exist
high-speed Ethernet infrastructures and then integrates stor-
age and IP protocols into a single cable transport and interface.
Content filters are often part of Internet firewalls but can be im-
plemented as either hardware or software. In such usage, con-
tent filtering is serving a security purpose – but content filtering
is also used to implement company policies related to informa-
tion system usage.
99
Question 63. Which of the following networking device con-
nects multiple switches, to form an even larger network?
(A) Switch
(B) Router
(C) Wireless Access Point
(D) Firewall
(A) MTRJ
(B) SC
(C) LC
(D) ST
101
CHAPTER 3
NETWORK OPERATIONS
Questions 66-86
102
Question 68. One of the features of SNMPv3 is called mes-
sage integrity.
(A) TRUE
(B) FALSE
105
Question 78. FTP uses port numbers 20 and ______ for com-
mand control and data transfer.
(A) 23
(B) 22
(C) 21
(D) 19
106
Question 81. ______________ measures how many packets arrive
at their destinations successfully.
(A) Bandwidth
(B) Throughput
(C) Error rate
(D) Utilization
108
Answers 66-86
SIEM tools:
111
The following are SNMPv3 features:
114
Question 73. Which of the following protocols uses the port
443 for its service?
(A) SSH
(B) RDP
(C) Telnet
(D) HTTPS
Password policy
MTTR (Mean time to repair) includes the time it takes to find out
about the failure, diagnose the problem, and repair it. MTTR is a
basic measure of how maintainable an organization’s equip-
ment is and, ultimately, is a reflection of how efficiently an or-
ganization can fix a problem.
119
Question 78. FTP uses port numbers 20 and ______ for com-
mand control and data transfer.
(A) 23
(B) 22
(C) 21
(D) 19
FTPS is also known FTP over TLS. At its core, FTPS (FTP over
SSL) is a secure file transfer protocol that allows you to connect
securely with your trading partners, customers, and users.
122
Question 81. ______________ measures how many packets arrive
at their destinations successfully.
(A) Bandwidth
(B) Throughput
(C) Error rate
(D) Utilization
The difference between a hot site and a warm site is that while
the hot site provides a mirror of the production data-center and
126
its environment(s), a warm site will contain only servers ready
for the installation of production environments.
128
CHAPTER 4
NETWORK SECURITY
Questions 87-110
129
(A) ping
(B) netstat
(C) ipconfig
(D) tracert
132
Question 99. Which of the following networking attacks re-
direct online traffic to a fraudulent website that resembles its in-
tended destination?
(A) DNS poisoning
(B) Phishing
(C) War-driving
(D) ARP poisoning
134
Question 106. Which of the following protocols are considered
secure protocols? (Choose all that apply)
(A) HTTP
(B) FTP
(C) SSH
(D) HTTPS
(E) Telnet
135
Question 109. A Logic bomb is a malicious program that is
triggered when a logical condition is met, such as after a num-
ber of transactions have been processed.
(A) TRUE
(B) FALSE
136
Answers 87-110
The attacks are made from security experts to find and exploit
vulnerabilities in a computer system.
2. Black box pen test – Also known as a ‘blind’ test, this is one
where the hacker is given no background information besides
the name of the target company.
138
that the pen test is happening, including the IT and security
professionals who will be responding to the attack. For covert
tests, it is especially important for the hacker to have the scope
and other details of the test in writing beforehand to avoid any
problems with law enforcement.
For example, the switch can limit the number of entries for any
port to 5 entries. Then, if the switch detects an attempt to store
more than 5 entries, it raises an alert.
142
Question 93. You have been tasked to blacklist certain com-
puters to connect on the Wi-Fi, based on their MAC address.
Which of the following tools will you use in order to complete
the task?
(A) EAP
(B) Preshared key
(C) Geofencing
(D) MAC Filtering
144
External-facing servers, resources, and/or services are located
in that place, so they are accessible from the internet, but the
rest of the internal LAN remains unreachable and safe.
Because the hacker owns the equipment being used, the victim
will have no idea that the hacker might be intercepting things
like bank transactions.
149
An evil twin access point can also be used in a phishing scam.
In this type of attack, victims will connect to the evil twin and
will be lured to a phishing site.
150
Question 105. Which one of the following attacks requires the
attacker to be on the same network as the victim?
(A) DNS poisoning
(B) Social engineering
(C) Logic bomb
(D) ARP poisoning
The secure version of the FTP is FTPS (FTP over SSL) which is
a secure file transfer protocol that allows you to connect se-
curely with your trading partners, customers, and users.
Here are some useful tips for ensuring your passwords are
as strong as possible:
157
CHAPTER 5
NETWORK TROUBLESHOOTING
AND TOOLS
Questions 111-125
Question 112. Identify the hardware tool from the photo below:
158
(A) Cable tester
(B) Crimper tool
(C) Tone generator
(D) Punch down tool
Question 113. Users complain that they can’t reach the site
www.examsdigest.com but they can reach other sites. You try
to access the site and discover you can’t connect either, but
you can ping the site with its IP address. Which of the following
is the most possible cause?
(A) Users have wrong IP settings
(B) The router is doesn't work
(C) The site www.examsdigest.com
(D) The DNS server is down
159
Question 115. Assuming you are working on a Windows envi-
ronment. Type the missing command to discover your IP infor-
mation, including DHCP and DNS server addresses.
(A) ipconfig/stats
(B) ipconfig/info
(C) ipconfig/all
(D) ipconfig/address
Question 116. Any device that uses the same frequency range
as the wireless device can cause interference.
(A) TRUE
(B) FALSE
160
Question 118. Which of the following describes the loss of
signal strength as a signal travels through a particular medium?
(A) Crosstalk
(B) Jitter
(C) Attenuation
(D) Latency
Question 119. PC1 can ping the printer device on the Market-
ing team network but can’t ping the printer on the Sales team
network. Assuming you are working on a Windows environ-
ment, what command will you type to get details about the
route that packets go through from the PC1 to the printer on the
Sales team network?
(A) ping
(B) tracert
(C) nslookup
(D) route
161
(A) Fake
(B) Untrust
(C) Clone
(D) Rogue
Question 124. Which of the following tools can you use to per-
form manual DNS lookups? Assuming you are working on a
Linux environment. (Choose all that apply)
(A) route
(B) pathping
(C) dig
(D) nslookup
(E) ifconfig
163
Answers 111-125
164
Question 112. Identify the hardware tool from the photo below:
Question 113. Users complain that they can’t reach the site
www.examsdigest.com but they can reach other sites. You try
165
to access the site and discover you can’t connect either, but
you can ping the site with its IP address. Which of the following
is the most possible cause?
(A) Users have wrong IP settings
(B) The router is doesn't work
(C) The site www.examsdigest.com
(D) The DNS server is down
Also, users have correct IP settings, and the router works fine,
as the users can access other sites.
166
Explanation 114. ping is the correct answer.
In order to check if a networked device is reachable you should
type the command ping in the command line.
Question 116. Any device that uses the same frequency range
as the wireless device can cause interference.
167
(A) TRUE
(B) FALSE
Users can see only the systems in their VLAN segment. This
can help control broadcast traffic and makes it easier to move
end systems around the network.
Question 119. PC1 can ping the printer device on the Market-
ing team network but can’t ping the printer on the Sales team
network. Assuming you are working on a Windows environ-
ment, what command will you type to get details about the
route that packets go through from the PC1 to the printer on the
Sales team network?
(A) ping
(B) tracert
(C) nslookup
(D) route
171
To use tracert, type the tracert command followed by the host-
name of the computer to which you want to trace the route.
For example, suppose that the printer on the Sales team net-
work has an IP of 123.123.123.123 then you can use the com-
mand tracert 123.123.123.123
172
Question 121. Which of the following options can’t affect the
wireless signal in the network?
(A) Refraction
(B) Reflection
(C) Crosstalk
(D) Absorption
175
Bandwidth speed tester is a way to measure the data flow in
a network. It’s an indication of how fast the data are transferred
through a network.
All the other answers are valid troubleshooting steps but only
after the information gathering has been completed.
Question 124. Which of the following tools can you use to per-
form manual DNS lookups? Assuming you are working on a
Linux environment. (Choose all that apply)
176
(A) route
(B) pathping
(C) dig
(D) nslookup
(E) ifconfig
178
THE END
179